Instruction generation and regularity extraction for reconfigurable processors
CASES '02 Proceedings of the 2002 international conference on Compilers, architecture, and synthesis for embedded systems
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Design of an Authentication Protocol for Gsm Javacards
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Efficient Software Implementation of AES on 32-Bit Platforms
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Differential Cryptanalysis of Q
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
IEEE Transactions on Computers
Taming the IXP network processor
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
AES and the cryptonite crypto processor
Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems
Efficient AES implementations for ARM based platforms
Proceedings of the 2004 ACM symposium on Applied computing
Flexible Software Protection Using Hardware/Software Codesign Techniques
Proceedings of the conference on Design, automation and test in Europe - Volume 1
Code protection for resource-constrained embedded devices
Proceedings of the 2004 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
Quantum-noise: protected data encryption for WDM fiber-optic networks
ACM SIGCOMM Computer Communication Review
SAFE-OPS: An approach to embedded software security
ACM Transactions on Embedded Computing Systems (TECS)
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Affine equivalence in the AES round function
Discrete Applied Mathematics
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Capability file names: separating authorisation from user management in an internet file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
Rotation symmetry in algebraically generated cryptographic substitution tables
Information Processing Letters
A Timing-Resistant Elliptic Curve Backdoor in RSA
Information Security and Cryptology
Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Formal verification of hardware support for advanced encryption standard
Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
IDEA and AES, two cryptographic algorithms implemented using partial and dynamic reconfiguration
Microelectronics Journal
A new methodology to implement the AES algorithm using partial and dynamic reconfiguration
Integration, the VLSI Journal
Affine equivalence in the AES round function
Discrete Applied Mathematics
Strong security for network-attached storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
FIRE: fault injection for reverse engineering
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
A subliminal channel in secret block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
F-FCSR: design of a new class of stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
An asynchronous covert channel using spam
Computers & Mathematics with Applications
Performance study of a compiler/hardware approach to embedded systems security
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Designing an efficient and secure public-key cryptosystem based on reducible rank codes
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Memory encryption for smart cards
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Compact implementation and performance evaluation of hash functions in ATtiny devices
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Cross-layer analysis of protocol delay in mobile devices receiving BCMCS
Wireless Networks
Analyzing and comparing the AES architectures for their power consumption
Journal of Intelligent Manufacturing
Hi-index | 0.01 |